How will you categorize a cybercrime that took place within a CSP's cloud environment?
A. Cloud as a Tool
B. Cloud as a Subject
C. Cloud as an Object
D. Cloud as an Audit
正解:C
質問 2:
An investigator needs to perform data acquisition from a storage media without altering its contents to maintain the Integrity of the content. The approach adopted by the Investigator relies upon the capacity of enabling read-only access to the storage medi a. Which tool should the Investigator Integrate Into his/her procedures to accomplish this task?
A. Backup tool
B. Write blocker
C. Data duplication tool
D. BitLocker
正解:C
質問 3:
Sheila is a forensics trainee and is searching for hidden image files on a hard disk. She used a forensic investigation tool to view the media in hexadecimal code for simplifying the search process. Which of the following hex codes should she look for to identify image files?
A. d0 0f 11 e0
B. ff d8 ff
C. 25 50 44 46
D. 50 41 03 04
正解:B
質問 4:
If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?
A. Lossless compression
B. Time-loss compression
C. Lossful compression
D. Lossy compression
正解:D
質問 5:
You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information posted on the job website considered?
A. Competitive exploit
B. Trade secret
C. Social engineering exploit
D. Information vulnerability
正解:D
質問 6:
Randy has extracted data from an old version of a Windows-based system and discovered info file Dc5.txt in the system recycle bin. What does the file name denote?
A. A text file copied from D drive to C drive in fifth sequential order
B. A text file deleted from C drive in fifth sequential order
C. A text file copied from C drive to D drive in fifth sequential order
D. A text file deleted from C drive in sixth sequential order
正解:B
質問 7:
William is examining a log entry that reads 192.168.0.1 - - [18/Jan/2020:12:42:29 +0000) "GET / HTTP/1.1" 200 1861. Which of the following logs does the log entry belong to?
A. Apache error log
B. The common log format of Apache access log
C. IIS log
D. The combined log format of Apache access log
正解:B
質問 8:
Which of the following methods of mobile device data acquisition captures all the data present on the device, as well as all deleted data and access to unallocated space?
A. Logical acquisition
B. Physical acquisition
C. Manual acquisition
D. Direct acquisition
正解:B
質問 9:
Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?
A. Standards and Criteria 1.5
B. Standards and Criteria 1.6
C. Standards and Criteria 1.7
D. Standards and Criteria 1.4
正解:A
Makino -
問題集の質問と解答を読むことを繰り返し、きちんと暗記して、合格できました。とても嬉しいです。ありがとうございました。